Company Details
noma-security
86
6,908
541514
noma.security
0
NOM_1073643
In-progress

Noma Security Company CyberSecurity Posture
noma.securityNoma Security is the agentic AI security platform giving enterprise organizations the confidence to rapidly build AI applications and adopt AI agents at scale. Noma Security uniquely provides cybersecurity teams with control of AI risk through continuous AI discovery and inventory, AI supply chain security, AI red teaming, and AI runtime protection to ensure compliance and risk mitigation. Backed by Ballistic Ventures, Glilot Capital, Cyber Club London, Databricks Ventures and SVCI, Noma Security is widely adopted by Fortune 500 customers and has been recognized by Gartner as a leading AI TRiSM solution.
Company Details
noma-security
86
6,908
541514
noma.security
0
NOM_1073643
In-progress
Between 700 and 749

Noma Security Global Score (TPRM)XXXX

Description: **Google Patches Zero-Click Vulnerability in Gemini Enterprise Exposing Corporate Data** In June 2025, security researchers at **Noma Security** uncovered a critical zero-click vulnerability in **Google Gemini Enterprise**, dubbed *GeminiJack*, which could enable attackers to exfiltrate sensitive corporate data without user interaction. The flaw, reported to Google the same day, affected **Gemini Enterprise**—Google’s suite of AI-powered workplace tools—and **Vertex AI Search**, a Google Cloud platform for AI-driven search and recommendations. The vulnerability stemmed from an **indirect prompt injection** weakness in Gemini’s **Retrieval-Augmented Generation (RAG)** architecture, which allows the AI to query across multiple Google Workspace data sources (Gmail, Google Docs, Calendar, etc.). Attackers could embed malicious instructions in seemingly benign documents, emails, or calendar events. When a legitimate employee performed a routine search, the AI would unknowingly process these instructions, scan authorized Workspace data for sensitive terms, and transmit the results to an attacker-controlled server via an external image URL—all while bypassing traditional security controls. The attack required no user interaction, making it particularly stealthy. Google confirmed the report in **August 2025** and collaborated with Noma Security to remediate the issue. By December, Google had deployed updates that **separated Vertex AI Search from Gemini Enterprise**, eliminating shared LLM workflows and RAG capabilities. However, Noma Security warned that such vulnerabilities may persist as AI systems gain broader access to corporate data, outpacing the detection capabilities of conventional security tools. The **UK’s National Cyber Security Centre (NCSC)** has since released guidance to help organizations mitigate prompt injection risks, underscoring the growing threat posed by AI-driven data exfiltration. The incident highlights the expanding attack surface introduced by corporate AI adoption, where a single flaw can expose vast amounts of sensitive information.


Noma Security has 53.85% more incidents than the average of same-industry companies with at least one recorded incident.
Noma Security has 29.87% more incidents than the average of all companies with at least one recorded incident.
Noma Security reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Noma Security cyber incidents detection timeline including parent company and subsidiaries

Noma Security is the agentic AI security platform giving enterprise organizations the confidence to rapidly build AI applications and adopt AI agents at scale. Noma Security uniquely provides cybersecurity teams with control of AI risk through continuous AI discovery and inventory, AI supply chain security, AI red teaming, and AI runtime protection to ensure compliance and risk mitigation. Backed by Ballistic Ventures, Glilot Capital, Cyber Club London, Databricks Ventures and SVCI, Noma Security is widely adopted by Fortune 500 customers and has been recognized by Gartner as a leading AI TRiSM solution.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas
.png)
The Noma Security report says the flaw was not a conventional bug but an architectural weakness in how the AI's Retrieval-Augmented...
Our picks for the hottest cybersecurity startups of 2025 include companies in key categories such as AI security and agentic-powered cyber...
As AWS hires a new VP to address rising AI challenges in cybersecurity, IT leaders are reckoning with a landscape that requires new skills.
CRN's list of the hottest AI security startups to know in 2025 includes early-stage vendors bringing new ways to secure GenAI-powered...
In today's digital landscape, cybersecurity platforms utilizing .Security domains are working to address the growing complexity of online...
This week's Cyber Security Headlines – Week in Review is hosted by David Spark with guests Brett Conlon, CISO, American Century Investments,...
Salesforce customers have been urged to patch immediately after cybersecurity researchers at Noma Labs uncovered a severe vulnerability.
Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence...
A critical vulnerability chain in Salesforce's Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Noma Security is https://noma.security.
According to Rankiteo, Noma Security’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, Noma Security currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Noma Security is not certified under SOC 2 Type 1.
According to Rankiteo, Noma Security does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Noma Security is not listed as GDPR compliant.
According to Rankiteo, Noma Security does not currently maintain PCI DSS compliance.
According to Rankiteo, Noma Security is not compliant with HIPAA regulations.
According to Rankiteo,Noma Security is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Noma Security operates primarily in the Computer and Network Security industry.
Noma Security employs approximately 86 people worldwide.
Noma Security presently has no subsidiaries across any sectors.
Noma Security’s official LinkedIn profile has approximately 6,908 followers.
Noma Security is classified under the NAICS code 541514, which corresponds to Others.
Yes, Noma Security has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/noma-94e0.
Yes, Noma Security maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/noma-security.
As of December 13, 2025, Rankiteo reports that Noma Security has experienced 1 cybersecurity incidents.
Noma Security has an estimated 3,083 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with noma security (researchers), and containment measures with separation of vertex ai search from gemini enterprise, changes to rag workflows, and remediation measures with updates to how gemini enterprise and vertex ai search interact with retrieval and indexing systems..
Title: GeminiJack: Zero-Click Vulnerability in Google Gemini Enterprise Leading to Corporate Data Leaks
Description: Google patched a zero-click vulnerability in Gemini Enterprise that could lead to corporate data leaks. The flaw, dubbed ‘GeminiJack’, is an architectural weakness in Google Gemini Enterprise and Vertex AI Search, allowing indirect prompt injection attacks to exfiltrate sensitive corporate information without user interaction or triggering security controls. The attack involves embedding hidden instructions in documents, emails, or calendar events, which Gemini Enterprise processes during routine searches, leading to data exfiltration via external image URLs.
Date Detected: 2025-06
Date Publicly Disclosed: 2025-12-08
Type: Zero-Click Vulnerability, Indirect Prompt Injection
Attack Vector: Malicious instructions embedded in Google Workspace documents (Google Docs, Gmail, Google Calendar)
Vulnerability Exploited: Architectural weakness in Google Gemini Enterprise and Vertex AI Search (RAG-based trust boundary exploitation)
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Sensitive corporate information
Systems Affected: Google Gemini Enterprise, Vertex AI Search, Google Workspace (Gmail, Google Docs, Google Calendar)
Operational Impact: Potential unauthorized data exfiltration without detection by traditional security tools
Brand Reputation Impact: Potential reputational damage due to data leaks
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive corporate information.

Entity Name: Google
Entity Type: Technology Company
Industry: Technology, Cloud Services, AI
Location: Global
Size: Large Enterprise
Customers Affected: Corporate users of Google Gemini Enterprise and Vertex AI Search

Third Party Assistance: Noma Security (researchers)
Containment Measures: Separation of Vertex AI Search from Gemini Enterprise, changes to RAG workflows
Remediation Measures: Updates to how Gemini Enterprise and Vertex AI Search interact with retrieval and indexing systems
Third-Party Assistance: The company involves third-party assistance in incident response through Noma Security (researchers).

Type of Data Compromised: Sensitive corporate information
Sensitivity of Data: High (corporate data)
Data Exfiltration: Yes (via external image URLs)
File Types Exposed: Google Docs, Gmail, Google Calendar events
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Updates to how Gemini Enterprise and Vertex AI Search interact with retrieval and indexing systems.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by separation of vertex ai search from gemini enterprise and changes to rag workflows.

Lessons Learned: Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.

Recommendations: Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research, (4) Follow NCSC guidance on mitigating prompt injection attacks.
Key Lessons Learned: The key lessons learned from past incidents are Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research and (4) Follow NCSC guidance on mitigating prompt injection attacks..

Source: Noma Security Report on GeminiJack
Date Accessed: 2025-12-08

Source: UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Noma Security Report on GeminiJackDate Accessed: 2025-12-08, and Source: UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks.

Investigation Status: Resolved (patches deployed)

Root Causes: Trust boundary exploitation in RAG architecture, lack of detection for AI-driven exfiltration
Corrective Actions: Separation of Vertex AI Search from Gemini Enterprise, updates to RAG workflows, changes to retrieval and indexing systems
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Noma Security (researchers).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Separation of Vertex AI Search from Gemini Enterprise, updates to RAG workflows, changes to retrieval and indexing systems.
Most Recent Incident Detected: The most recent incident detected was on 2025-06.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-08.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive corporate information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Noma Security (researchers).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Separation of Vertex AI Search from Gemini Enterprise and changes to RAG workflows.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive corporate information.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research and (4) Follow NCSC guidance on mitigating prompt injection attacks..
Most Recent Source: The most recent source of information about an incident are Noma Security Report on GeminiJack and UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (patches deployed).
.png)
PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F handlers allow a specially crafted disc image or ELF to cause an out-of-bounds read from emulator memory. Because the offset and size is controlled through MG header fields, a specially crafted ELF can read data beyond the bounds of mg_buffer and have it reflected back into emulated memory. This issue is fixed in version 2.5.378.
Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.
A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=zone. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.